The Apache Software Foundation takes security issues very seriously. Due to the infrastructure nature of the Apache ZooKeeper project specifically, we haven't had many reports over time, but it doesn't mean that we haven't had concerns over some bugs and vulnerabilities. If you have any concern or believe you have uncovered a vulnerability, we suggest that you get in touch via the e-mail address email@example.com. In the message, try to provide a description of the issue and ideally a way of reproducing it. Note that this security address should be used only for undisclosed vulnerabilities. Dealing with known issues should be handled regularly via jira and the mailing lists. Please report any security problems to the project security address before disclosing it publicly.
The ASF Security team maintains a page with a description of how vulnerabilities are handled, check their Web page for more information.
CVE-2016-5017: Buffer overflow vulnerability in ZooKeeper C cli shell
Note: The 3.5 branch is still alpha at this time.
- ZooKeeper 3.4.x users should upgrade to 3.4.9 or apply this patch
- ZooKeeper 3.5.x users should upgrade to 3.5.3 when released or apply
The patch solves the problem reported here, but it does not make the
CVE-2017-5637: DOS attack on wchp/wchc four letter words (4lw)
Note: The 3.5 branch is still beta at this time.